A risk assessment model for supply chain design. Implementation at Kuehne + Nagel Luxembourg

Author(s):  
Anne Winter ◽  
Ioana Deniaud ◽  
Francois Marmier ◽  
Emmanuel Caillaud
Author(s):  
Liane Marcia Freitas Silva ◽  
Ana Camila Rodrigues de Oliveira ◽  
Maria Silene Alexandre Leite ◽  
Fernando A. S. Marins

2013 ◽  
Vol 380-384 ◽  
pp. 4740-4744
Author(s):  
Xiao Feng Zhou ◽  
Hong Lv ◽  
Shi Wei Xu

The method of fuzzy influence diagram is a very effective way when assessing the supply chain risk of electronic products foundries. Firstly, this paper puts forward a idea that using the fuzzy influence diagram method to assess the supply chain risk of electronic products OEM industry. Then construct a supply chain risk assessment model of electronic products OEM industry which is based on fuzzy influence diagram. Through the two points, we can determine how much the probability of risk events and the damage is. Except that, this paper also introduces the steps of model evaluation briefly.


Computers ◽  
2019 ◽  
Vol 8 (3) ◽  
pp. 66
Author(s):  
Olusola Akinrolabu ◽  
Steve New ◽  
Andrew Martin

Security and privacy concerns represent a significant hindrance to the widespread adoption of cloud computing services. While cloud adoption mitigates some of the existing information technology (IT) risks, research shows that it introduces a new set of security risks linked to multi-tenancy, supply chain and system complexity. Assessing and managing cloud risks can be a challenge, even for cloud service providers (CSPs), due to the increased numbers of parties, devices and applications involved in cloud service delivery. The limited visibility of security controls down the supply chain, further exacerbates this risk assessment challenge. As such, we propose the Cloud Supply Chain Cyber Risk Assessment (CSCCRA) model, a quantitative risk assessment model which is supported by supplier security posture assessment and supply chain mapping. Using the CSCCRA model, we assess the risk of a SaaS application, mapping its supply chain, identifying weak links in the chain, evaluating its security risks and presenting the risk value in monetary terms (£), with this, promoting cost-effective risk mitigation and optimal risk prioritisation. We later apply the Core Unified Risk Framework (CURF) in comparing the CSCCRA model with already established methods, as part of evaluating its completeness.


Sign in / Sign up

Export Citation Format

Share Document